Login / Signup

An encrypted speech authentication and tampering recovery method based on perceptual hashing.

Qiu-yu ZhangDeng-hai ZhangFu-jiu Xu
Published in: Multim. Tools Appl. (2021)
Keyphrases
  • detection method
  • similarity measure
  • speech recognition